Threats facing digital marketing Flashcards Preview

Digital Marketing strategy > Threats facing digital marketing > Flashcards

Flashcards in Threats facing digital marketing Deck (9)
Loading flashcards...
1
Q

What is the difference between commodity and bespoke attack?

A

Commodity: use of tools openly available, implemented by competent user. (Ex; software that scans for known vulnerabilities)

Bespoke: specifically designed for an attack domain for organised crime and states (Ex; Zero day vulnerability)

2
Q

How do attacks occur on firms?

A
  1. DDOS (distributed denial of service) attack, multiple systems are infected in order to target single system causing denial of service attack.
  2. Ransomware (common in NHS)
  3. Supply chain attack
3
Q

How are attacks imposed on users?

A
  1. Phishing: fake emails, install software, visit website through luring (Made by Botnet)
  2. Ransomware: malware downloaded (e-mail link)
  3. Speed Phishing: target specific individual (CEO)
  4. Browser hijacking: redirected from page you view
  5. Bogus participants: fake identities/business
  6. Fake site: contain malware or fraudulent
4
Q

How do attacks occur on the IoT?

A
  • 2013/2014: DDOS attack which involve IoT devices include TVs and at least on fridge.
  • security of devices has not been of main focus
  • 25% of spam was sent from IoT devices
  • simple attacks, based on default passwords
5
Q

How does the management of IoT devices make attacks more likely? (LIMUA)

A
  1. Locating devices where accessible to hackers
  2. Identical devices, means vulnerability can be exploited on a large scale
  3. Mass scale, Devices are deployed/connected
  4. upgrading them might not be available
  5. Awareness from users is lacking, of problems/Hijacking due to no obvious signs
6
Q

WHO carries out attacks on the web?

A
  1. Hacktivists: e.g. Bradley Manning, Edward Snowden. Insider/outsiders of the firm. Use Wikileaks to publish the case.
  2. Criminal organisations: firms are lucrative, they try to extort money, extract data, sell secrets.
  3. Careless and comprised employers and insiders. the dark web is a source of tools and marketplace for stolen details.
7
Q

What are some general solutions to cyber attacks? (COKS)

A
  1. Conscious care behaviour
  2. Organisational policies
  3. Knowledge sharing
  4. Security collaboration (reduces cost and improves performance)
8
Q

What are the percentages of financial fraud losses by type?

A
  1. Payment card (75%), 46% e-commerce
  2. Remote Banking (22%)
  3. Cheque (3%)
9
Q

How does attacks using data in transit work?

A
  1. Interception of data in transit “Man in the middle”
  2. Eavesdropping, theft of details (passwords)
  3. both internal and external
    e. g. spoof wifi-networks, use of virtual private networks